HowTo.MovePasswordsToEtcShadow History

SlugOS and maybe also other distros store weak crypt-hashes of passwords in /etc/shadow, which is a bad thing in terms of security. While TinyLogin? may or may not be compiled with support for stronger password hashes, it is possible to move the weak password hashes to /etc/shadow which is normally not readable for ordinary users. The following script faciliates the process:

to:

SlugOS and maybe also other distros store weak crypt-hashes of passwords in /etc/shadow, which is a bad thing in terms of security. While tinylogin may or may not be compiled with support for stronger password hashes, it is possible to move the weak password hashes to /etc/shadow which is normally not readable for ordinary users. The following script faciliates the process:

SlugOS and maybe also other distros store weak crypt-hashes of passwords in /etc/shadow, which is a bad thing in terms of security. While tinylogin may or may not be compiled with support for stronger password hashes, it is possible to move the weak password hashes to /etc/shadow which is normally not readable for ordinary users. The following script faciliates the process:

to:

SlugOS and maybe also other distros store weak crypt-hashes of passwords in /etc/shadow, which is a bad thing in terms of security. While TinyLogin? may or may not be compiled with support for stronger password hashes, it is possible to move the weak password hashes to /etc/shadow which is normally not readable for ordinary users. The following script faciliates the process:

SlugOS and maybe also other distros store weak crypt-hashes of passwords in /etc/shadow, which is a bad thing in terms of security. While tinylogin may or may not be compiled with support for stronger password hashes, it is possible to move the weak password hashes to /etc/shadow which is normally not readable for ordinary users. The following script faciliates the process: